Analysis
-
max time kernel
130s -
max time network
149s -
platform
debian-12_armhf -
resource
debian12-armhf-20240418-en -
resource tags
arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
13-12-2024 09:19
Behavioral task
behavioral1
Sample
zmap.arm7.elf
Resource
debian12-armhf-20240418-en
debian-12-armhf
4 signatures
150 seconds
General
-
Target
zmap.arm7.elf
-
Size
152KB
-
MD5
9ce68a667c961a44758e17f18e39419d
-
SHA1
94e93cd72a812771cb287774caec8db0620778a5
-
SHA256
17d8a0966c1b3e904e9a38c0bc508575744fe2c83c0eced9ab9c1b78a4d2977d
-
SHA512
1714462669e8ddb172e2f54b026c2044678916da69e9d8a247ec43806331c29296a800e7e7e0c1d557672bb2897490020072d006b8f0dd47f4708b2ec9a10f05
-
SSDEEP
3072:gXNsG9xNku03aoanAE+zRzHnbNc57VMzzLSO4PFM/9h7TBA:gXNsiEuToanL+zRzHbNyYLS7dM/9Zy
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 705 zmap.arm7.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog zmap.arm7.elf File opened for modification /dev/misc/watchdog zmap.arm7.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog zmap.arm7.elf File opened for modification /bin/watchdog zmap.arm7.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself c5o45ppovtcjt3sq 705 zmap.arm7.elf